of connection and applicational data transmission
.
One last possible concern with the use of a proxy
server could be raised regarding scaling, since a
server-side application must relay the communica-
tion between the client and the DBMS in the SPDC
presented in this article
. However, there is no issue
in having several of these proxy servers to process
the client’s requests to connect to the database since
they are inherently stateless
. They establish a
connection given a token, and once the connection
terminates a new connection can only be made by
presenting another token.
Finally, in terms of future work it would be
interesting to address the eavesdropping issue on the
proxy server. This could be achieved by adding a
layer on top of the database that accepts connections
and all data is encrypted using, for example, the
authentication server password of the user. The
implications of such alteration must be carefully
studied and tested.
ACKNOWLEDGEMENTS
This work is funded by National Funds through
FCT - Fundação para a Ciência e a Tecnologia under
the project UID/EEA/50008/2013 and
SFRH/BD/109911/2015.
REFERENCES
Abramov, J. et al., 2012. A methodology for integrating
access control policies within database development.
Computers {&} Security, 31(3), pp.299–314.
Bauer, C. & King, G., 2005. Hibernate in Action.
Ferraro, P., HA-JDBC: High-Availability JDBC.
Available at: https://ha-jdbc.github.io [Accessed
September 13, 2016].
Gessert, F. et al., 2014. Towards a scalable and unified
REST API for cloud data stores. Lecture Notes in
Informatics (LNI), Proceedings - Series of the
Gesellschaft fur Informatik (GI), P-232, pp.723–734.
IETF, 2000a. RFC 2743: Generic Security Service
Application Program Interface Version 2, Update 1.
IETF, 2000b. RFC 2865: Remote Authentication Dial In
User Service (RADIUS).
IETF, 2008. RFC 5246: The Transport Layer Security
(TLS) Protocol - Version 1.2.
Lavarene, J. de, 2010. SSL With Oracle JDBC Thin
Driver. Available at: http://www.oracle.com/
technetwork/topics/wp-oracle-jdbc-thin-ssl-
130128.pdf.
Microsoft, SQL Server Security Modes. Available at:
https://msdn.microsoft.com/en-
us/library/aa266913(v=vs.60).aspx [Accessed
September 13, 2016].
Naylor, D. et al., 2015. Multi-Context TLS (mcTLS).
ACM SIGCOMM Computer Communication Review,
45(5), pp.199–212.
Neuman, C.B. & Ts’o, T., 1994. Kerberos: An
Authentication Service for Computer Networks. IEEE
Communications Magazine, 32(9), pp.33–38.
Oppliger, R., Hauser, R. & Basin, D., 2006. SSL/TLS
session-aware user authentication - Or how to
effectively thwart the man-in-the-middle. Computer
Communications, 29(12), pp.2238–2246.
Oppliger, R., Hauser, R. & Basin, D., 2008. SSL/TLS
session-aware user authentication revisited. Computers
and Security, 27, pp.64–70.
Oracle, Authentication Using Third-Party Services.
Available at: https://docs.oracle.com/cd/B19306_01/
network.102/b14266/authmeth.htm#i1009853
[Accessed August 13, 2016].
Oracle, 1997. JDBC Introduction. Available at:
http://docs.oracle.com/javase/tutorial/jdbc/overview/in
dex.html [Accessed March 3, 2014].
Pereira, O.M., Regateiro, D.D. & Aguiar, R.L., 2014.
Role-Based Access control mechanisms. In 2014 IEEE
Symposium on Computers and Communications
(ISCC). Vancouver, BC, Canada: IEEE, pp. 1–7.
Pereira, Ó.M., Regateiro, D.D. & Aguiar, R.L., 2015.
Secure, dynamic and distributed access control stack
for database applications. International Journal of
Software Engineering and Knowledge Engineering,
25(9–10), pp.1703–1708.
Regateiro, D.D., Pereira, Ó.M. & Aguiar, R.L., 2014. A
secure, distributed and dynamic RBAC for relational
applications. University of Aveiro.
Shay, R. et al., 2016. Designing Password Policies for
Strength and Usability. ACM Transactions on
Information and System Security, 18(4), pp.1–34.
Villager, C. & Dittmann, J., 2008. Biometrics for User
Authentication. In Encyclopedia of Multimedia.
Boston, MA: Springer US, pp. 48–55.
Yang, X.L. et al., 2016. What Security Questions Do
Developers Ask? A Large-Scale Study of Stack
Overflow Posts.
Journal of Computer Science and
Technology, 31(5), pp.910–924.
Zarnett, J., Tripunitara, M. & Lam, P., 2010. Role-based
access control (RBAC) in Java via proxy objects using
annotations. Proceeding of the 15th ACM symposium
on Access control models and technologies - SACMAT
’10, p.79.
Zimmerman, M., 2003. Biometrics and User
Authentication. Available at: https://www.sans.org/
reading-room/whitepapers/authentication/biometrics-
user-authentication-122.